时间:2017-03-09 12:56:39

标签: hadoop hbase phoenix mapr

每当我尝试连接到安全HBase时,我都会收到以下错误。 使用命令启动Phoenix:./ sqlline.py:5181:/ hbase :: 使用的端口是5181,因为它是MapR hadoop。 HBase版本为1.1.1,Phoenix版本为4.8.1。

Phoenix在实施Kerberos之前没有遇到任何问题。我们传递给不安全集群的jdbc url是./sqlline.py:5181

我在启动Phoenix之前在所有节点上执行了命令kinit。 任何帮助表示赞赏。感谢。

错误日志:

  

WARN ipc.AbstractRpcClient:连接到服务器时遇到异常:javax.security.sasl.SaslException:GSS启动失败[由GSSException引起:未提供有效凭据(机制级别:无法找到任何Kerberos tgt)]   FATAL ipc.AbstractRpcClient:SASL身份验证失败。最可能的原因是凭据丢失或无效。考虑一下' kinit'。   javax.security.sasl.SaslException:GSS启动失败[由GSSException引起:未提供有效凭据(机制级别:无法找到任何Kerberos tgt)]           在com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)           在org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:179)           at org.apache.hadoop.hbase.ipc.RpcClientImpl $ Connection.setupSaslConnection(RpcClientImpl.java:612)           at org.apache.hadoop.hbase.ipc.RpcClientImpl $ Connection.access $ 600(RpcClientImpl.java:157)           在org.apache.hadoop.hbase.ipc.RpcClientImpl $ Connection $ 2.run(RpcClientImpl.java:738)           at org.apache.hadoop.hbase.ipc.RpcClientImpl $ Connection $ 2.run(RpcClientImpl.java:735)           at java.security.AccessController.doPrivileged(Native Method)           在javax.security.auth.Subject.doAs(Subject.java:415)           在org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1657)           at org.apache.hadoop.hbase.ipc.RpcClientImpl $ Connection.setupIOstreams(RpcClientImpl.java:735)           at org.apache.hadoop.hbase.ipc.RpcClientImpl $ Connection.writeRequest(RpcClientImpl.java:897)           at org.apache.hadoop.hbase.ipc.RpcClientImpl $ Connection.tracedWriteRequest(RpcClientImpl.java:866)           在org.apache.hadoop.hbase.ipc.RpcClientImpl.call(RpcClientImpl.java:1209)           在org.apache.hadoop.hbase.ipc.AbstractRpcClient.callBlockingMethod(AbstractRpcClient.java:217)           at org.apache.hadoop.hbase.ipc.AbstractRpcClient $ BlockingRpcChannelImplementation.callBlockingMethod(AbstractRpcClient.java:318)           在org.apache.hadoop.hbase.protobuf.generated.ClientProtos $ ClientService $ BlockingStub.scan(ClientProtos.java:32831)           at org.apache.hadoop.hbase.client.ScannerCallable.openScanner(ScannerCallable.java:373)           在org.apache.hadoop.hbase.client.ScannerCallable.call(ScannerCallable.java:200)           在org.apache.hadoop.hbase.client.ScannerCallable.call(ScannerCallable.java:62)           at org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithoutRetries(RpcRetryingCaller.java:200)           at org.apache.hadoop.hbase.client.ScannerCallableWithReplicas $ RetryingRPC.call(ScannerCallableWithReplicas.java:350)           at org.apache.hadoop.hbase.client.ScannerCallableWithReplicas $ RetryingRPC.call(ScannerCallableWithReplicas.java:324)           在org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:126)           at org.apache.hadoop.hbase.client.ResultBoundedCompletionService $ QueueingFuture.run(ResultBoundedCompletionService.java:64)           在java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)           at java.util.concurrent.ThreadPoolExecutor $ Worker.run(ThreadPoolExecutor.java:615)           在java.lang.Thread.run(Thread.java:745)   引起:GSSException:未提供有效凭据(机制级别:无法找到任何Kerberos tgt)           at sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:147)           at sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:121)           at sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:187)           at sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:223)           at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212)           at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179)           在com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193)           ......还有26个

0 个答案:

没有答案